How to Fight Footprinting
- Place offline any information that has the potential to identify and compromise (By footprinting) your organization’s security such as access to business plans, formulas, and proprietary documents. to secure data from footprinting attack.
- Determine the level of information that is necessary for the public about your organization and make only that piece available on the network.
- Visit your organization on the Web to determine current insecurities and the attributes for protection.
- Run a ping sweep on your organizational network to see results.
- Familiarize yourself with the American Registry for Internet Numbers (ARIN) to determine network blocks.
Top Ten Ways to Secure Against Attack
- Keep patches up to date by installing weekly or daily if possible. Buffer overflow and privilege escalation attacks can usually be prevented by keeping patches up-to-date. Check your vendor’s site daily for new patch releases and monitor the Computer Emergency Response Team’s site, http://www.cert.org, for information on the latest vulnerabilities.
- Shut down unnecessary services/ports. Review your installation requirements by eliminating unnecessary services and applications. Perform a post-installation lockdown and hardening of the machine. Lance Spitzner, Senior Security Architect for Sun Microsystems, Inc. authors a useful site, http://www.enteract.com/~lspitz, with more information.
- Change default passwords by choosing strong passwords that utilize uppercase/ lowercase/ numbers/special characters. Some database applications create a database administrator account with no password. To protect against this vulnerability, test the accounts after install, and if no password is found on any account, disable the account or set a strong password. Weak passwords are not much better than no password at all. Examples of weak passwords include the user’s name, birth date, or a dictionary word. Educate your administrators and users about the importance of strong passwords. A strong password should contain upper and lower case letters, as well as numbers and special characters (!, #, $, etc). A strong password should also be at least 7-8 characters in length, depending on operating system. Many operating systems provide means for requiring complex passwords, when enabled. More extreme countermeasures include one-time password mechanisms.
- Control physical access to systems. Protecting physical access to computer systems is as important as protecting computer access. Be sure employees lock down consoles when not in use—an unlocked desktop screen can instantly allow a hacker access to the network as a privileged user. A hacker may also gain access to the network via a network jack in a conference room or any non-restricted area. Data centers and network closets should be treated with vigilance as well. Even a locked door may not be enough protection in the face of a determined attacker. Alarms, video cameras, raised floors, security guards, customer accessible cages, biometric scans, and ID cards may be necessary to adequately defend against network attacks.
- Curtail unexpected input. Some Web pages allow users to enter usernames and passwords. These Web pages can be used maliciously by allowing the user to enter in more than just a username. Username: jdoe; rm -rf / This might allow an attacker to remove the root file system from a UNIX Server. Programmers should limit input characters, and not accept invalid characters such as |; < > as possible input.
- Perform backups and test them on a regular basis.
- Educate employees about the risks of social engineering and develop strategies to validate identities over the phone, via e-mail, or in person.
- Encrypt and password-protect sensitive data. Data such as Web accessible e-mail should be considered sensitive data and should be encrypted. This will discourage any type of sniffer program or exposure of sensitive company data.
- Implement security hardware and software. Firewalls and intrusion detection systems should be installed at all perimeters of the network. Viruses, Java, and ActiveX can potentially harm a system. Anti-virus software and content filtering should be utilized to minimize this threat.
- Develop a written security policy for the company. These methods will help to lessen attacks of footprinting, which lead to your computer or your company being hacked. With that said, a company has to stay vigil at all times due to new methods of intrusion being developed almost daily.
Author : cialfor
Updated : 9/26/2016
- image credit to google
- introduction to cyber security – Data64